Mamoun Alazab

Assoc Prof

Registered to supervise postgraduate research

PhD projects

Deep Learning Applications for Cyber Security

20122021

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2016

Spam and criminal activity

Alazab, M. & Broadhurst, R., Dec 2016, Trends and Issues in Crime and Criminal Justice, 526, p. 1-20 20 p.

Research output: Contribution to specialist publicationArticle

Open Access
2015

From ZeuS to zitmo: Trends in banking malware

Etaher, N., Weir, G. R. S. & Alazab, M., 2 Dec 2015, Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Helsinki; Finland: IEEE, Institute of Electrical and Electronics Engineers, Vol. 1. p. 1386-1391 6 p. 15635698

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Mining malware to detect variants

Azab, A., Layton, R., Alazab, M. & Oliver, J., 1 Jan 2015, Proceedings - 5th Cybercrime and Trustworthy Computing Conference, CTC 2014. Aukland; New Zealand: IEEE, Institute of Electrical and Electronics Engineers, p. 44-53 10 p. 15059252

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Profiling and classifying the behavior of malicious codes

Alazab, M., Feb 2015, In : Journal of Systems and Software. 100, p. 91-102 12 p.

Research output: Contribution to journalArticle

2014

Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime

Broadhurst, R., Grabosky, P., Alazab, M. & Chon, S., 1 Jan 2014, In : International Journal of Cyber Criminology. 8, 1, p. 1-20 20 p.

Research output: Contribution to journalArticle

Open Access
File
71 Downloads (Pure)

Quality approaches for performance measurement in Jordanian E-government services

Venkatraman, S. & Alazab, M., 2014, IT in the Public Sphere: Applications in Administration, Government, Politics, and Planning. United States: IGI Global, p. 99-119 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Using response action with Intelligent Intrusion detection and prevention System against web application malware

Alazab, A., Hobbs, M., Abawajy, J., Khraisat, A. & Alazab, M., 2014, In : Information Management and Computer Security. 22, 5, p. 431-449 19 p.

Research output: Contribution to journalArticle

2013

Identifying cyber predators through forensic authorship analysis of chat logs

Amuchi, F., Al-Nemrat, A., Alazab, M. & Layton, R., May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC; Australia: IEEE, Institute of Electrical and Electronics Engineers, p. 28-37 10 p. 6498425

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Malicious code detection using penalized splines on OPcode frequency

Alazab, M., Al Kadiri, M., Venkatraman, S. & Al-Nemrat, A., 13 May 2013, 2012 Third Cybercrime and Trustworthy Computing Workshop. VIC, Australia: IEEE Computer Society, p. 38-47 10 p. 6498426

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Malicious Spam Emails Developments and Authorship Attribution

Alazab, M., Layton, R., Broadhurst, R. & Bouhours, B., 1 Jan 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney NSW, Australia: IEEE Computer Society, p. 58-68 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Performance evaluation of e-government services using balanced scorecard: An empirical study in Jordan

Alhyari, S., Alazab, M., Venkatraman, S., Alazab, M. & Alazab, A., 1 Jul 2013, In : Benchmarking. 20, 4, p. 512-536 25 p.

Research output: Contribution to journalArticle

Skype Traffic Classification Using Cost Sensitive Algorithms

Azab, A., Layton, R., Alazab, M. & Watters, P., 2013, 2013 Fourth Cybercrime and Trustworthy Computing Workshop. Sydney, Australia: IEEE Computer Society, p. 14-21 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Towards a feature rich model for predicting spam emails containing malicious attachments and URLs

Tran, K. N., Alazab, M. & Broadhurst, R., 2013, Data Mining and Analytics 2013: Proceedings of the 11th Australasian Data Mining Conference, AusDM 2013. Christen, P., Kennedy, P., Liu, L., Ong, K-L., Stranieri, A. & Zhao, Y. (eds.). Australian Computer Society, Vol. 146. p. 161-172 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

2012

Analysis of firewall log-based detection scenarios for evidence in digital forensics

Mukhtar, R., Al-Nemrat, A., Alazab, M., Venkatraman, S. & Jahankhani, H., Oct 2012, In : International Journal of Electronic Security and Digital Forensics. 4, 4, p. 261-279 19 p.

Research output: Contribution to journalArticle

Cybercrime: The case of obfuscated malware

Alazab, M., Venkatraman, S., Watters, P., Alazab, M. & Alazab, A., 7 Nov 2012, Global Security, Safety and Sustainability & e-Democracy. e-Democracy 2011, ICGS3 2011. Springer Berlin, p. 204-211 8 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 99).

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedings

Six sigma approach to improve quality in e-services: An empirical study in Jordan

Alhyari, S., Alazab, M., Venkatraman, S., Alazab, M. & Alazab, A., 1 Apr 2012, In : International Journal of Electronic Government Research. 8, 2, p. 57-74 18 p., 3.

Research output: Contribution to journalArticle